11436 SSO

Technology

Technology
by Kumar Srivastava Nov 01, 2013
API programs have become commonplace at nearly all big retailers who offer multi-channel experiences to their customers through mobile apps, in-store kiosks, the Web, and personalized in-store services. Analyzing the... Read more
API programs have become commonplace at nearly all big retailers who offer multi-channel experiences to their customers through mobile apps, in-store kiosks, the Web, and personalized in-store services, among other things. Analyzing the anatomy of a typical retail API program uncovers some interesting patterns.... Read more...
606
Technology
by Anant Jhingran Oct 22, 2013
There are known knowns. These are things we know that we know. There are known unknowns. That is to say, there are things that we know we don't know. But there are also unknown unknowns. There are things we don't know... Read more
The topic for today is the art of knowing the known unknowns - applied to enterprise analytics, not war! After all, we are here to create value, not destroy it. Quite simply, known unknowns are enterprise metrics that we know are important, but we just do not know what their value is at any given moment in time. In other words, Key Performance Indicators (KPIs)!... Read more...
606
Technology
by Dilshad Simons and Nikhil Dinghra Oct 14, 2013
Enterprises are drawing on the tools of the digital trade -- APIs, data, and apps -- in what is amounting to a gold rush in the new digital world. A treasure map of how these tools can be used to transform digital... Read more
Enterprises are drawing on the tools of the digital trade -- APIs, data, and apps -- in what is amounting to a gold rush in the new digital world. A treasure map of how these tools can be used to transform digital assets into revenue streams is critical to navigating this uncharted world and discovering gold. In our Digital Gold Rush blog series, we're charting out out the different business models for monetizing digital products; last time we discussed the revenue share model. This time we're discussing fee-based models.... Read more...
606
Technology
by Rakesh Saha Oct 10, 2013
Persistence services and caching are essential for optimizing for performance, building business logic, and scaling APIs to serve more traffic than a back-end service could otherwise support. One of the important... Read more
Persistence services and caching are essential for optimizing for performance, building business logic, and scaling APIs to serve more traffic than a back-end service could otherwise support. One of the important factors of building a full-service API layer is to have access to different kinds of persistence services. The Apigee API Platform offers several flavors of persistence and provides an API and a GUI for self-service management of the cache. Caching solutions that support different usecases include: Cache, Response Cache, Key Value Map, and App Services.... Read more...
606
Technology
by Brett Oct 07, 2013
    "Information is a valuable national asset whose value is multiplied when it is made easily accessible to the public"from Open Data Policy~ US Office of Management and Budget/Office of Science and... Read more
An Executive Order by the Obama Administration in May 2013 required that, going forward, data generated by the government be made available in open, machine-readable formats, while appropriately safeguarding privacy, confidentiality, and security. With this groundbreaking move, the Obama administration communicated a clear vision for a new digital government and it is embracing Web APIs as the way to make this a reality. Digital government will shift how government connects with, and provides services to, the American people.... Read more...
606
Technology
by Apigee Product Team Sep 30, 2013
With media reports of hacker incidences, stolen credit card numbers, and identity theft, consumers are understandably concerned about information security. We want absolute assurance from businesses that our credit card... Read more
With media reports of hacker incidences, stolen credit card numbers, and identity theft, consumers are understandably concerned about information security. We want absolute assurance from businesses that our credit card numbers and other personal information is secure. Payment Card Industry’s Data Security Standard (PCI DSS) defines the standard for securing cardholder data, wherever it is located. Apigee recently completed an annual audit and PCI recertification verifying that we continue to meet the Credit Card industry requirements for information security.... Read more...
606
Technology
by Jeff Smith Sep 05, 2013
In this video (7:15) we examine a simple use case and demonstrate how to use the Apigee Platform to expose a standard SAP backend and convert a JSON request into a SOAP SAP back-end request. You will see that in a... Read more
In this video we examine a simple use case and demonstrate how to use the Apigee Platform to expose a standard SAP backend and convert a JSON request into a SOAP SAP back-end request. You will see that in a matter of minutes, with no coding and taking advantage of capabilities like XSLT, you can make it possible for mobile apps to consume services from an ERP backend system.... Read more...
606

I Love APIs Europe 2016

Next Steps

 
 

Resources Gallery

News